{"uuid": "3e70169a-571a-41c7-b5e6-6ee3f6c8a4f9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-3448", "type": "seen", "source": "https://t.me/arpsyndicate/4524", "content": "#ExploitObserverAlert\n\nCVE-2024-3448\n\nDESCRIPTION: Exploit Observer has 3 entries in 1 file formats related to CVE-2024-3448. Users with low privileges can perform certain AJAX actions.  In this vulnerability instance, improper access to ajax?action=plugin:focus:checkIframeAvailability leads to a Server-Side Request Forgery by analyzing the error messages returned from the back-end. Allowing an attacker to perform a port scan in the back-end. At the time of publication of the CVE no patch is available.\n\nFIRST-EPSS: 0.000430000\nARPS-EXPLOITABILITY: 0.5780347", "creation_timestamp": "2024-04-12T05:17:27.000000Z"}